Abstract is missing.
- CommitteeSorel Reisman. [doi]
- Message from the Workshop Chairs; COMPSAC 2024A. K. M. Jahangir Alam Majumder, Yoshiaki Hori, Ji-Jiang Yang. [doi]
- Trans3-Vision: Transfer Learning Based Transformer for Transparent Object Segmentation with Grounded-ID2Junyang Wang. 1-10 [doi]
- Online Nonstationary and Nonlinear Bandits with Recursive Weighted Gaussian ProcessYusuke Miyake, Ryuji Watanabe, Tsunenori Mine. 11-20 [doi]
- Verifying Multi -Agent Coordination Correctness for BDI AgentsGeeta Mahala, Aditya Ghose, Hoa Khanh Dam, Angela Consoli. 21-26 [doi]
- Development of Quality Control Systems for an Autonomous Cherry Sorting PrototypeRicardo Cerrud, Shinji Kotani, Hiromi Watanabe. 27-32 [doi]
- Test Case Selection in Continuous Regression Testing Using Machine Learning: An Industrial Case StudyAzeem Ahmad, Dimistris Rentas, Daniel Hasselqvist, Pontus Sandberg, Kristian Sandahl, Aneta Vulgarakis. 33-38 [doi]
- Characterize and Compare the Performance of Deep Learning Optimizers in Recurrent Neural Network ArchitecturesMohammad Zaeed, Tanzima Z. Islam, Vladimir Indic. 39-44 [doi]
- LLM-Based Class Diagram Derivation from User Stories with Chain-of-Thought PromptingsYishu Li, Jacky Keung, Xiaoxue Ma, Chun Yong Chong, Jingyu Zhang, Yihan Liao. 45-50 [doi]
- Formalization and Verification of OpenStack Swift Using CSPZiqing Su, Wei Lin, Huibiao Zhu. 51-60 [doi]
- Scalable Computation of Inter-Core Bounds Through Exact AbstractionsMohammed Aristide Foughali, Marius Mikucionis, Maryline Zhang. 61-70 [doi]
- Towards Multilevel Logistic Regression and Cluster Analysis for Academic Performance Examination and PredictionMyke Morais de Oliveira, Douglas Augusto de Paula, Ellen Francine Barbosa. 71-80 [doi]
- ChatGPT, be my Teaching Assistant! Automatic Correction of SQL ExercisesLuca Cagliero, Laura Farinetti, Jacopo Fior, Andrea Ignazio Manenti. 81-87 [doi]
- Early Identification of Struggling Students in Large Computer Science Courses: A Replication StudyNils Rys-Recker, Qiang Hao. 88-93 [doi]
- Fault Localization for Novice Programs Combining Static Analysis and Dynamic DetectionHan Wan, Wenhao Nie, Shiyang Yue, Xiaoyan Luo. 94-102 [doi]
- Development of Digital Competencies in Education Through Staff Training Events and International SchoolsMarina Marchisio Conte, Fabio Roman, Matteo Sacchet, Enrico Spinello, Daniela Voicu, Magdalena Rykala, Linko Nikolov. 103-108 [doi]
- A Proposal for the Smart Classroom Infrastructure Using IoT and Artificial IntelligenceAntoni Martínez-Ballesté, Edgar Batista, Elena Figueroa, Gabriela Fretes Torruella, Cèlia Llurba, José Quiles-Rodríguez, Oihane Unciti, Ramon Palau. 109-114 [doi]
- Exploring Collaborative Immersive Virtual Reality Serious Games for Enhancing Learning Motivation in Physics EducationLinjing Sun, Boon-Giin Lee, David Chieng, Sen Yang. 115-120 [doi]
- Detecting LLM-Generated Text in Computing Education: Comparative Study for ChatGPT CasesMichael Sheinman Orenstrakh, Oscar Karnalim, Carlos Aníbal Suárez, Michael Liut. 121-126 [doi]
- Learning from the Past: Using Peer Data to Improve Course Recommendations in Personalized EducationColton Walker, Sahra Sedigh Sarvestani, Ali R. Hurson. 127-137 [doi]
- Enhancing ADS Testing: An Open Educational Resource for Metamorphic TestingYifan Zhang, Dave Towey, Matthew Pike, Zhi Quan Zhou, Tsong Yueh Chen. 138-147 [doi]
- Hybrid Teaching Based on a 4C Model-Based FrameworkHenry C. B. Chan. 148-152 [doi]
- AI to the Test: Measuring ChatGPT's Objective Accuracy in the SATs in Comparison to Human PerformanceEliza Janel L. Tan, Keith Alexandre L. Ramos, Maria Elisha Kaye B. Nazario, Steven Vincent D. Lim, Shirley B. Chu. 153-158 [doi]
- PMCS: Partition-Based Maximal Frequent Subgraph Mining Using MCSVani Sancheti, Lini T. Thomas, Vikram Pudi. 159-168 [doi]
- From Data to Forecast: A Comparative Evaluation of Machine Learning and Deep Learning Models for Rainfall Prediction in AustraliaYashodha Karunarathna, Caslon Chua. 169-178 [doi]
- Designing a Lightweight Convolutional Neural Network for Camouflaged Object DetectionMark Edward M. Gonzales, Hans Oswald A. Ibrahim, Elyssia Barrie H. Ong, Ann Franchesca B. Laguna. 179-187 [doi]
- PERFGEN: A Synthesis and Evaluation Framework for Performance Data using Generative AIBanooqa H. Banday, Tanzima Z. Islam, Aniruddha Marathe. 188-197 [doi]
- A Time-Efficient Distributed Constant Conditional Functional Dependency Discovery Algorithm for Data ConsistencyJunchao Chen, Jian-Tao Zhou 0002, Xinyu Hao. 198-203 [doi]
- A Cryptocurrency Multiple Trading Strategy with Kalman Filter Innovation Volatility Interval ForecastsYou Liang, Aerambamoorthy Thavaneswaran, Juan Liyau, Areebah Muhammad, Thimani Ranathungage, Ruppa K. Thulasiram. 204-209 [doi]
- Novel Resilient Model Risk Forecasts Based on Neuro Volatility ModelsMd. Erfanul Hoque, Sulalitha Bowala, Avanthi Saumyamala, Aerambamoorthy Thavaneswaran, Ruppa K. Thulasiram. 210-219 [doi]
- Assessing Maintainability Risks in the Open Source Software Supply Chain: An Empirical Quality ApproachFenglin Bi, Sijia Zhao, Wei Wang, Songlin Wu. 220-231 [doi]
- Quantum DNA Encoder: A Case-Study in gRNA AnalysisPhuong Nam Nguyen. 232-239 [doi]
- Reimagine Application Performance as a Graph: Novel Graph-Based Method for Performance Anomaly Classification in High-Performance ComputingChase Phelps, Ankur Lahiry, Tanzima Z. Islam, Line C. Pouchard. 240-245 [doi]
- Sequential Recommendation with Temporal Influence Based on Hawkes ProcessPeiji Yu, Tianxing Wu 0001, Dongjing Wang, Dengwei Xu. 246-253 [doi]
- How to Fit the SCC Algorithm Efficiently into Distributed Graph Iterative ComputationXiaochen Sun, Wei Wang 0049, Tao Huang. 254-263 [doi]
- Applied Data Analytics Approach for Defect Root Causes Analysis in Manufacturing: The Case of Multi-Product Assembly LinesLouis Puech, Ambre Dupuis, Camélia Dadouchi, Robert Pellerin. 264-272 [doi]
- Zero-Shot Hierarchical Classification on the Common Procurement Vocabulary TaxonomyFederico Moiraghi, Matteo Palmonari, Davide Allavena, Federico Morando. 273-278 [doi]
- An Empirical Approach for Clustering-Based Time Series Summarisation AssessmentDevis Bianchini, Massimiliano Garda. 279-284 [doi]
- Sentiment-Driven LSTM Analysis of Bitcoin Price: Uncovering Insights from Tweets and Macroeconomics DataChia-Chun Hsu, Po-Han Lu, Jyun-Siyan Chu, Ya-Ning Chang. 285-290 [doi]
- Improvement of Deep Learning Models by Excluding Inappropriate Data Based on InterpretabilitySaneyasu Yamaguchi, Fuma Hirabayashi, Atsuki Tamekuri. 291-296 [doi]
- Comparative Analysis of ImageNet Pre-Trained Deep Learning Models and DINOv2 in Medical Imaging ClassificationYuning Huang, Jingchen Zou, Lanxi Meng, Xin Yue, Qing Zhao, JianQiang Li, Changwei Song, Gabriel Jimenez 0001, Shaowu Li, Guanghui Fu. 297-305 [doi]
- Efficient Multi-network Community Search Method for Distributed Graph Iterative ComputationXiaochen Sun, Wei Wang, Tao Huang. 306-311 [doi]
- Natural Language Processing for Recognizing Bangla Speech with Regular and Regional Dialects: A Survey of Algorithms and ApproachesParamita Basak Upama, Parama Sridevi, Masud Rabbani, Kazi Shafiul Alam, Munirul Haque, Sheikh Iqbal Ahamed. 312-319 [doi]
- ActivePCA: A Novel Framework Integrating PCA and Active Machine Learning for Efficient Dimension ReductionPriyanka Bhyregowda, Mohammad Masum, Lohuwa Mamudu, Mohammed Chowdhurv, Sai Chandra Kosaraiu, Hossain Shahriar. 320-325 [doi]
- Research on Deep Clustering Based Trajectory Frequent Pattern MiningBohua Tian, Yan Wang. 326-331 [doi]
- An Ontology Alignment Validation Approach Based on Supervised Machine Learning Algorithms and Automatic Schema Matching ApproachFaten Abbassi, Yousra Bendaly Hlaoui. 332-341 [doi]
- BloomWalk and CuckooWalk: Fast Random Walks Utilizing Probabilistic Data StructureRen Inayoshi, Han Nay Aung, Hiroyuki Ohsaki. 342-349 [doi]
- A Federated Learning Framework Based on Spatio-Temporal Agnostic Subsampling (STAS) for Forest Fire PredictionAbdul Mutakabbir, Chung-Horng Lung, Samuel A. Ajila, Kshirasagar Naik, Marzia Zaman, Richard Purcell, Srinivas Sampalli, Thambirajah Ravichandran. 350-359 [doi]
- On Leveraging Multi-Page Element Relations in Visually-Rich DocumentsDavide Napolitano, Lorenzo Vaiani, Luca Cagliero. 360-365 [doi]
- Strategic Integration of Context for Fine-Tuning Topic Model PerformancePierre Dardouillet, Kavé Salamatian, Hervé Verjus, Faiza Loukil, David Telisson, Olivier Le Van. 366-375 [doi]
- Deception and Lie Detection Using Reduced Linguistic Features, Deep Models and Large Language Models for Transcribed DataTien Nguyen, Faranak Abri, Akbar Siami Namin, Keith S. Jones. 376-381 [doi]
- Learning Priors of Human Motion With Vision TransformersPlacido Falqueto, Alberto Sanfeliu, Luigi Palopoli 0002, Daniele Fontanelli. 382-389 [doi]
- Enhancing Crime Investigation: Attention-Based GAN for Sketch-to-Portrait ConversionSheng Yun, Haoran Xue, Xueqing Zhang, Junkai Zhang, Yijun Zhao. 390-395 [doi]
- Novel Data-Driven Dynamic Network Science Application in Algorithmic TradingThimani Ranathungage, Aerambamoorthy Thavaneswaran, You Liang, Ruppa K. Thulasiram, Alex Paseka. 396-401 [doi]
- A Multimodal Personalized Architecture for Irregular Bicycle Riding Form DetectionHayato Tomisu, Hideto Yano, Naoto Kai, Tomoki Yoshihisa. 402-410 [doi]
- Mobile Microlearning to Scaffold Project-Based Learning Using ARCS Model: A Preliminary StudyAmarpreet S. Gill, Derek S. Irwin, Dave Towey, Yanhui Zhang. 411-420 [doi]
- On the Impact of Network Topology on Distributed Online Kernel LearningHan Nay Aung, Hiroyuki Ohsaki. 421-428 [doi]
- Effective Compression of Language Models by Combining Pruning and Knowledge DistillationChi-Yu Chiu, Ding-Yong Hong, Pangfeng Liu, Jan-Jan Wu. 429-438 [doi]
- LLMChain: Blockchain-Based Reputation System for Sharing and Evaluating Large Language ModelsMouhamed Amine Bouchiha, Quentin Telnoff, Souhail Bakkali, Ronan Champagnat, Mourad Rabah, Mickaël Coustaty, Yacine Ghamri-Doudane. 439-448 [doi]
- Context-Aware Personalized Route Recommendations for Bicycle Users Using Large-Scale Mobility DataFrancesco Maria Turno, Aleksejs Vesjolijs, Jelena Kijonoka, Irina Yatskiv. 449-454 [doi]
- FedAVO: Improving Communication Efficiency in Federated Learning with African Vultures OptimizerMd. Zarif Hossain, Ahmed Imteaj, Abdur R. Shahid. 455-462 [doi]
- Multi-Accelerator Neural Network Inference via TensorRT in Heterogeneous Embedded SystemsYuxiao Zhou 0002, Zhishan Guo, Zheng Dong 0002, Kecheng Yang 0001. 463-472 [doi]
- Approximate Vedic Multiplier Architecture for Efficient CNN Acceleration on Embedded DevicesAnakhi Hazarika, Nikumani Choudhury, Soumyajit Poddar. 473-482 [doi]
- Optimal Multi-Constrained Workflow Scheduling for Cyber-Physical Systems in the Edge-Cloud ContinuumAndreas Kouloumpris, Georgios L. Stavrinides, Maria K. Michael, Theocharis Theocharides. 483-492 [doi]
- Trusted Off-Chain Machine Learning Scheme Based on ZK -SNARK and OracleZehui Yuan, Xue Zeng, Libo Feng, Xian Deng, Zhixing Zhang, Peng Wu, Fake Fang, Jiale Xie. 493-498 [doi]
- Uncovering the Metaverse within Everyday Environments: A Coarse-to-Fine ApproachBehaviorsLiming Xu, Dave Towey, Andrew P. French, Steve Benford. 499-509 [doi]
- Towards Communication-Efficient Federated Learning Through Particle Swarm Optimization and Knowledge DistillationSaika Zaman, Sajedul Talukder, Md Zarif Hossain, Sai Puppala, Ahmed Imteaj. 510-518 [doi]
- Progressive Sign Language Video Translation Model for Real-World Complex Background EnvironmentsJingchen Zou, Jianqiang Li 0002, Xi Xu, Yuning Huang, Jing Tang, Changwei Song, Linna Zhao, Wenxiu Cheng, Chujie Zhu, Suqin Liu. 519-524 [doi]
- Response Time and Energy-Aware Optimization for Co-Locating Microservices and Offline TasksJie Wang, Huiqun Yu, Guisheng Fan, Jiayin Zhang. 525-530 [doi]
- Experiences in Building a Digital Twin Framework: Challenges and Possible SolutionsRong Gu, Teodor Barbuceanu, Ning Xiong 0001, Tiberiu Seceleanu. 531-536 [doi]
- Node Embedding Accelerates Randoms Walk on a GraphHan Nay Aung, Hiroyuki Ohsaki. 537-545 [doi]
- Dynamic Positioning Vectors for Collaborative UWB- Based PositioningYerkezhan Sartayeva, Henry C. B. Chan. 546-555 [doi]
- EdgeFL: A Lightweight Decentralized Federated Learning FrameworkHongyi Zhang, Jan Bosch, Helena Holmström Olsson. 556-561 [doi]
- BFSA: Blockchain-Enhanced Flexible Storage Architecture for Smart Building IoT ApplicationsJinqian Jiang, Xiaohua Wu, Zirui Wang, Jun Cheng, Tao Meng. 562-567 [doi]
- Survey on Objective Measurement and Sensor-Based Detection of Physical and Social ActivitiesArafat Mahmood, Parama Sridevi, Padmapriya Velupillai Meikandan, Sheikh Iqbal Ahamed. 568-577 [doi]
- Safety of the Intended Functionality of External Human Interfaces: Gaps and Research AgendaManabu Okada, Barbara Gallina. 578-583 [doi]
- Reinforcement Learning to Personalize User eXperience within Digital Business EcosystemsMustapha Kamal Benramdane, Elena Kornyshova. 584-593 [doi]
- SocialGuard: Bangla Text-Based Gender Identification for Enhancing Integrity in Social NetworksMd Jahangir Alam 0003, Sultan Ahmed, Ismail Hossain, Sai Puppala, Zahidur Talukder, Sajedul Talukder. 594-604 [doi]
- Dynamic Behavior Variation in Virtual Human Agents Driven by a Model of Needs and PersonalitySean Brzoska, Wesley Deneke. 605-610 [doi]
- The Audience Effect: Do Observations Change Outcomes in HCI Studies?Huimin Tang, Boon-Giin Lee, Dave Towey, Kaiyi Chen, Yichu Fang, Runzhou Zhang, Matthew Pike. 611-620 [doi]
- Exploring Emotional Responses with Dynamic Difficulty Adjustment Adaptation in Immersive Virtual Reality ExergamingRenzhi Han, Boon-Giin Lee, Dave Towey, Yuan Yao, Matthew Pike. 621-627 [doi]
- A Comparative Human-Robot Interaction Study between Face-Display and an Advanced Social RobotAhmed Salem, Kaoru Sumi. 628-633 [doi]
- Identifying Key Players and Themes in Michigan Protests Through Social Network AnalysisHieu Nguyen, Swapna S. Gokhale. 634-639 [doi]
- Evaluating Graphical User Interfaces for Improving Depth Perception with Remote Crane OperatorsTaufik Akbar Sitompul, Johan Harju. 640-649 [doi]
- Interaction Between Unmanned Systems and Humans: An Example of a Smart Passenger Access Gate for Autonomous Urban Passenger FerriesFelix-Marcel Petermann. 650-655 [doi]
- Exploring Gaming Technologies, Digital Twins, and VR to Visualise Wireless Propagation SimulationsLouis Nisiotis, Anna Anikina, Marios Raspopoulos. 656-661 [doi]
- Exploiting Transformer Models in Three-Version Image Classification SystemsShamima Afrin, Fumio Machida. 662-669 [doi]
- Systematic Literature Review of Prompt Engineering Patterns in Software EngineeringYuya Sasaki 0006, Hironori Washizaki, Jialong Li, Dominik Sander, Nobukazu Yoshioka, Yoshiaki Fukazawa. 670-675 [doi]
- Low-Resolution Face Recognition for CCTV and Edge-Powered Smart Attendance SystemsNico Surantha, Edward Yose, Sani Muhamad Isa. 676-681 [doi]
- Agile Requirements Engineering in a Distributed Environment: Experiences from the Software Industry During Unprecedented Global ChallengesYishu Li, Jacky Keung, Kwabena Ebo Bennin, Xiaoxue Ma, Jingyu Zhang, Zhen Yang. 682-691 [doi]
- Detection of Lesion Candidates and Extraction of Diagnostically Inconclusive Images in Capsule Endoscopy Using YOLOv5Tatsuki Ito, Shinji Kotani, Hiromi Watanabe. 692-700 [doi]
- Leveraging Large Language Models for Automatic Smart Contract GenerationEmanuele Antonio Napoli, Fadi Barbàra, Valentina Gatteschi, Claudio Schifanella. 701-710 [doi]
- A Review of Big Data and Machine Learning Operations in Official Statistics: MLOps and Feature Store AdoptionCarlos Eduardo Ramos Nunes, Afshin Ashofteh. 711-718 [doi]
- Automatic Generation of Selective Disassembly Sequences for Augmented Reality-Guided MaintenanceXin Zhao, Hao Huang, Yue Wang, Hongyong Fu. 719-724 [doi]
- Discovering Implicit Operational Knowledge by Identifying Business Processes that Involve Multiple Organizational EntitiesShinobu Saito, Yukako Iimura. 725-730 [doi]
- A Nested Three-Stage Game Algorithm Based on Chess Shape Evaluation for Tibetan Jiu ChessChen Su, Yong Li, Xiali Li, Yandong Chen, Xiaoyu Fan. 731-736 [doi]
- Data Center Energy Consumption Prediction Model Based on Deep Neural Network BiLSTMJunqiang Zhou, Yan Wang, JieFeng Lil. 737-745 [doi]
- Multivariate Time-Series Anomaly Detection in IoT with a Bi-Dual GM GRU AutoencoderYuan-Cheng Yu, Yen Chieh Ouyang, Ling-Wei Wu, Chun-An Lin, Kuo-Yu Tsai. 746-754 [doi]
- SPV: Formal Verification of Stateful Parallel SFC CorrectnessYijun Guo, Zhenyu Liu, Yintan Ai, Hua Li. 755-764 [doi]
- MECM2M: An MEC Based M2M System Considering Mobile Nodes as Compute ServersRempei Sawada, Haruto Takano, Kosuke Mori, Fumio Teraoka. 765-775 [doi]
- E-LDAC: A High-Accuracy Method for Predicting Bursty Latency in 5G NetworksZhibo Zhang, Huiqiang Wang, Hongwu Lv, Jiayu Sun. 776-783 [doi]
- A Real-Time Background Replacement Method Based on Machine Learning for AR ApplicationsYoshihiro Tsuboki, Tomoya Kawakami, Satoru Matsumoto, Tomoki Yoshihisa, Yuuichi Teranishi. 784-793 [doi]
- Optimizing WDM Network Restoration with Deep Reinforcement Learning and Graph Neural Networks IntegrationIsaac Ampratwum, Amiya Nayak. 794-800 [doi]
- SCALE: Self-Regulated Clustered FederAted LEarning in a Homogeneous EnvironmentSai Puppala, Ismail Hossain, Md Jahangir Alam 0003, Zahidur Talukder, Syed Bahauddin, Sajedul Talukder. 801-806 [doi]
- Fluid-Based Modeling of TCP BBR Congestion Control MechanismShota Inoue, Ryo Nakamura, Hiroyuki Ohsaki. 807-816 [doi]
- FLNET: Fluid-Based Large-Scale Network SimulatorShota Inoue, Tomoka Yamasaki, Ryo Nakamura, Hiroyuki Ohsaki. 817-826 [doi]
- CFSCare: ML-Based Activity Monitoring System for Chronic Fatigue Syndrome Patients Using Smartphone and Wrist SensorArafat Mahmood, Parama Sridevi, Masud Rabbani, Padmapriya Velupillai Meikandan, Mohammad Syam, Syeda Shefa, William C. Chu, Sheikh Iqbal Ahamed. 827-832 [doi]
- Analysis and Prediction of In- Hospital Risks Among COVID-19 Patients with Substance Use Disorder (SUD)Jiawei Wu, Priyanka Annapureddy, Praveen Madiraju, Sheikh Iqbal Ahamed, Jennifer Hernandez-Meier, Constance Kostelac, Julia Dickson-Gomez. 833-842 [doi]
- ML-Based Chronic Kidney Disease and Diabetes Prediction with Feature Effect Analysis Using SHAPParama Sridevi, Padmapriya Velupillai Meikandan, Paramita Basak Upama, Masud Rabbani, Kazi Shafiul Alam, Dipranjan Das, Sheikh Iqbal Ahamed. 843-850 [doi]
- Emotion Recognition Technology for People with Autism: A Systematic Literature ReviewDmitriy Bogush, Connor Costello, Emma Fong, Moushumi Sharmin, Shameem Ahmed. 851-861 [doi]
- Identifying Medical Concepts and Semantic Types in Lay Vocabularies of Health Consumers Who are Concerned with Diabetes on Social Media Using the UMLS and NLPAdib Ahmed Anik, Paramita Basak Upama, Masud Rabbani, Shiyu Tian, Min Sook Park, Sheikh Iqbal Ahamed, Jake Luo, Hyunkyoung Oh. 862-869 [doi]
- An Affordable Real-Time Wearable Monitoring System for Head Impact DetectionAlaa Aldin Ghazal, S. G. Ganpule. 870-876 [doi]
- BlockPRLS: Blockchain-Based Patient Record Linkage System for Big Data AnalyticsAbu Sayed Md Latiful Hoque, Md Raihan Mia, Mohammad Sajid Abdullah, Md. Jahedul Islam, Bipul Chandra Dev Nath, Muhammad Rahman 0006, Sheikh Iqbal Ahamed. 877-886 [doi]
- Towards Understanding the Challenges, Needs, and Opportunities Pertaining to Assessment Techniques for Autistic College Students in ComputingMoushumi Sharmin, Jordan Archer, Adrian Heffelman, Eli Graves, Yasmine N. Elglaly, Shameem Ahmed. 887-893 [doi]
- A Learning-Based and Network-Aware Power Management for Mobile DevicesJin Zhang, Jiangjie Huang, Long Peng, Xiaodong Liu 0004, Jie Yu, Wenzhu Wang. 894-899 [doi]
- Digital Twins Environment Simulation for Testing Healthcare IoT ApplicationsHassan Sartaj, Shaukat Ali 0001, Julie Marie Gjøby. 900-901 [doi]
- A Novel Cascade Classifier Framework for Open-World Medicinal Plant ClassificationTanisha Rana, Soumen Sinha, Rahul Roy. 902-907 [doi]
- Causality-Aware Pattern Mining Scheme for Group Activity RecognitionHyunju Kim, Heesuk Son, Dongman Lee. 908-917 [doi]
- Intent-Based Pseudonymization for Healthcare Workflows on Intra-Hospital Data Space DomainGabriele Morabito, Armando Ruggeri, Antonio Celesti, Massimo Villari, Maria Fazio. 918-927 [doi]
- Evaluation of Gaze Input in 3D Space for a Person with Multiple Physical Disabilities Using a Robot and DronesHiromi Watanabe, Mariko Kono, Shinji Kotani. 928-933 [doi]
- Training Sequential CAG Segmentation Models Without Labeled CAG Video DataTing-Chia Yao, Kai-Wen Lin, Chih-Kuo Lee, Po-Hsuan Tseng, Che-Rung Lee. 934-940 [doi]
- Leveraging Technology to Address Women's Health Challenges: A Comprehensive SurveySayeda Farzana Aktar, Paramita Basak Upama, Sheikh Iqbal Ahamed. 941-949 [doi]
- Listening to the Brain: A Novel Approach to Understanding Cerebral Dynamics through Blood Flow SoundsMasud Rabbani, Subarna Alam, Md Raihan Mia, Anubhav Parida, Iysa Iqbal, Hansika Kolli, Parama Sridevi, Kazi Shafiul Alam, Paramita Basak Upama, Rumi Ahmed Khan, Sheikh Iqbal Ahamed. 950-957 [doi]
- CCall: Recovering Indirect Call Targets from Binaries With Cross-Domain Fine-TuningBin Weng, Yunru Wang, Juan Wang, Mengda Yangl, Ziang Lil, Fei Lil. 958-969 [doi]
- Efficiently Calculating Stronger Lower Bound for Differentially Private SGD in Black-Box SettingToshiki Shibahara, Takayuki Miura, Masanobu Kii, Atsunori Ichikawa. 970-975 [doi]
- PIXHELL Attack: Leaking Sensitive Information from Air-Gap Computers via 'Singing Pixels'Mordechai Guri. 976-987 [doi]
- Textual Differential Privacy for Context-Aware Reasoning with Large Language ModelJunwei Yu, Jieyu Zhou, Yepeng Ding, LingFeng Zhang, Yuheng Guo, Hiroyuki Sato. 988-997 [doi]
- RollupTheCrowd: Leveraging ZkRollups for a Scalable and Privacy-Preserving Reputation-Based Crowdsourcing PlatformAhmed Mounsf Rafik Bendada, Mouhamed Amine Bouchiha, Mourad Rabah, Yacine Ghamri-Doudane. 998-1006 [doi]
- Customized Malware: Identifying Target Systems Using Personally Identifiable InformationRui Tanabe, Yuta Inoue, Daigo Ichikawa, Takahiro Kasama, Daisuke Inoue, Katsunari Yoshioka, Tsutomu Matsumoto. 1007-1012 [doi]
- XGDFed: Exposing Vulnerability in Byzantine Robust Federated Binary Classifiers with Novel Aggregation-Agnostic Model Poisoning AttackIsrat Jahan Mouri, Muhammad Ridowan, Muhammad Abdullah Adnan. 1013-1022 [doi]
- Ants: Attacking Spatial Temporal Graph Learning Networks StructurallyRan Ran, Qi Liu 0017, Nuo Xu, Ning Sui, Wujie Wen. 1023-1028 [doi]
- Comparison of Methods for Automatically Predicting CVSS Base VectorSho Isogai, Shinpei Ogata, Yutaro Kashiwa, Satoshi Yazawa, Kozo Okano, Takao Okubo, Hironori Washizaki. 1029-1034 [doi]
- SQLPass: A Semantic Effective Fuzzing Method for DBMSYu Li, Yixiao Yang, Yong Guan, Zhiping Shi 0002, Rui Wang 0024. 1035-1044 [doi]
- Breaking reCAPTCHAv2Andreas Plesner, Tobias Vontobel, Roger Wattenhofer. 1047-1056 [doi]
- Uncovering the Interpretation of Large Language ModelsMst. Shapna Akter, Hossain Shahriar, Alfredo Cuzzocrea, Fan Wu 0013. 1057-1066 [doi]
- Fine-Tuned Variational Quantum Classifiers for Cyber Attacks Detection Based on Parameterized Quantum Circuits and OptimizersMd. Abdur Rahman, Mst. Shapna Akter, Emily Miller, Bogdan Timofti, Hossain Shahriar, Mohammad Masum, Fan Wu 0013. 1067-1072 [doi]
- Quantum Adversarial Attacks: Developing Quantum FGSM AlgorithmMst. Shapna Akter, Hossain Shahriar, Alfredo Cuzzocrea, Fan Wu 0013. 1073-1079 [doi]
- Robustness of Random Walk on a Graph against Adversary AttacksHiroki Kawamura, Satoshi Shiina, Han Nay Aung, Hiroyuki Ohsaki. 1080-1088 [doi]
- EGAGN: Generative Adversarial Graph Networks for Ethereum Phishing Scams DetectionBo Cui, Zhenyu Zhang, Wenhan Hou. 1089-1094 [doi]
- Enhancing Valid Test Input Generation with Distribution Awareness for Deep Neural NetworksJingyu Zhang, Jacky Keung, Xiaoxue Ma, Xiangyu Li, Yan Xiao, Yishu Li, Wing Kwong Chan. 1095-1100 [doi]
- Secure Backup and Recovery of SSI Wallets using Solid Pod TechnologyMohammad Farhad, Gourab Saha, Masum Alam Nahid, Fairuz Rahaman Chowdhury, Partha Protim Paul, Mohammed Raihan Ullah, Md Sadek Ferdous. 1101-1111 [doi]
- GuardFL: Detection and Removal of Malicious Clients Through Majority ConsensusMd Hasebul Hasan, Md Shariful Islam Khan, Md Shafayatul Haque, Ajmain Yasar Ahmed, Muhammad Abdullah Adnan. 1112-1117 [doi]
- CoMDet: A Contrastive Multimodal Pre-Training Approach to Encrypted Malicious Traffic DetectionJiakun Sun, Xiaotian Zhang, Yabo Wang, Shuyuan Jin. 1118-1125 [doi]
- SLIMECRAFT: State Learning for Client-Server Regression Analysis and Fault TestingEric Lesiuta, Victor Bandur, Mark Lawford. 1126-1137 [doi]
- GeoGRCNN: Synthetic Trajectory Generation for Location Privacy ProtectionSrikanth Narayanan, Chaoquan Cai, Dan Lin 0001. 1138-1147 [doi]
- Differential Private Histogram Publication with Background KnowledgeRuixin Xue. 1148-1156 [doi]
- Prevalence and Prediction of Unseen Co-Changes: A Graph-Based ApproachAmit Kumar, Ethari Hrishikesh, Yugandhar Deasi, Sonali Agarwal. 1157-1167 [doi]
- Characterizing Developers' Behaviors in LLM -Supported Software DevelopmentWei Wang, Huilong Ning, Shuo Qian, Gaowei Zhang, Yi Wang. 1168-1177 [doi]
- Unveiling Hidden Anomalies: Leveraging SMAC-LSTM for Enhanced Software Log AnalysisYicheng Sun, Jacky Keung, Jingyu Zhang, Hi Kuen Yu, Wenqiang Luo, Shuo Liu. 1178-1183 [doi]
- MT-PART: Metamorphic-Testing-Based Adaptive Random Testing Through PartitioningZhihao Ying, Dave Towey, Tsong Yueh Chen, Zhi Quan Zhou. 1184-1193 [doi]
- Security Orchestration with Explainability for Digital Twins-Based Smart SystemsMinh Tri Nguyen, An Ngoc Lam, Phu Nguyen, Hong-Linh Truong 0001. 1194-1203 [doi]
- Enhancing Representations Based on Inherent InformationZicong Zhuang, Pingjian Zhang. 1204-1207 [doi]
- Audio Steganography Based Backdoor Attack for Speech Recognition SoftwareMengyuan Zhang, Shunhui Ji, Hanbo Cai, Hai Dong, Pengcheng Zhang, Yunhe Li. 1208-1217 [doi]
- Predicting Change-Proneness with a Deep Learning Model: Incorporating Structural DependenciesYamin Hu, Hao Jiang. 1218-1229 [doi]
- Boundary-Guided Black-Box Fairness TestingZiqiang Yin, Wentian Zhao, Tian Song. 1230-1239 [doi]
- Gradient-Guided Test Case Generation for Image Classification SoftwareShunhui Ji, Yunhe Li, Hai Dong, Mingxuan Xiao, Pengcheng Zhang, Mengyuan Zhang. 1240-1249 [doi]
- Interlinking Clinical Guidelines via Mining Medical Literature Knowledge for Multi-Morbidity Decision-MakingHang Yang, Liang Xiao 0004, Rujun Zhu, Ziji Liu, Jianxia Chen. 1250-1255 [doi]
- Towards Continuous Deployment at Scale in Software-Intensive Embedded Systems: A Maturity Model from the Telecommunications DomainAnas Dakkak, Jan Bosch, Helena Holmström Olsson. 1256-1267 [doi]
- FOQL: Software Aging Determination and Rejuvenation Strategy Generation for DockerYiming Liu, Zhuanzhuan Liu, Xueyong Tan, Jing Liu. 1268-1273 [doi]
- Neural-MBFL: Improving Mutation-Based Fault Localization by Neural MutationBin Du, Baolong Han, Hengyuan Liu, Zexing Chang, Yong Liu 0030, Xiang Chen 0005. 1274-1283 [doi]
- Empirical Study on GitHub Issue Report TemplatesJin Zhang, Maoqi Peng, Yang Zhang. 1284-1289 [doi]
- CodeFuse: Multimodal Code Search Model with Fine-Grained Attention AlignmentShengnan Zhang, Shuiyan Li, Rongzhi Qi, Xiaofeng Zhou. 1290-1299 [doi]
- Instrumenting Runtime Goal Monitoring for F' Flight SoftwareJialong Li, Christos Tsigkanos, Nianyu Li, Kenji Tei. 1300-1309 [doi]
- Multi-Objective Test Case Generation for Web Applications with Limited ResourcesJunxia Guo, Bowen Yu, Li Liu, Weiwei Wang. 1310-1315 [doi]
- Towards a Unified Approach for Software Architecture RecoveryHasan Sözer. 1316-1317 [doi]
- Microcompositions for Goal-Driven Self-AdaptationAlan Colman, Quoc Bao Vo, Anton V. Uzunov, Saad Sajid Hashmi, Hoa Khanh Dam, Mohan Baruwal Chhetri. 1318-1323 [doi]
- Practitioners' Expectations on Code Smell DetectionZexian Zhang, Shuang Yin, Wenliu Wei, Xiaoxue Ma, Jacky Wai Keung, Fuyang Li, Wenhua Hu. 1324-1333 [doi]
- MTSA: Multi-Granularity Metamorphic Testing for Sentiment Analysis SystemsHonghao Huang, Ya Pan, Lan Luo, Yinfeng Wang. 1334-1343 [doi]
- Context-Focused Prompt Tuning Pre-Trained Code Models to Improve Code SummarizationXinglu Pan, Chenxiao Liu, Yanzhen Zou, Xianlin Zhao, Bing Xie. 1344-1349 [doi]
- Cloned Code Clustering for the Software Product Line Engineering Approach to Developing a Family of ProductsTaeyoung Kim, Jihyun Lee, Sungwon Kang. 1350-1355 [doi]
- A Systematic Literature Review on MBT Test Cases MaintenanceCarlos D. Q. Lima, Everton L. G. Alves, Wilkerson de L. Andrade. 1356-1365 [doi]
- Enhancing Collaborative Software Development: A Deep Learning Approach for Bot RecommendationJin Zhang, Xingjin Wu, Yang Zhang, Shunyu Xu, Maoqi Peng. 1366-1375 [doi]
- Combining Prompts with Examples to Enhance LLM-Based Requirement ElicitationShuaicai Ren, Hiroyuki Nakagawa, Tatsuhiro Tsuchiya. 1376-1381 [doi]
- Determine When and How to Perform Edge Rejuvenation Effectively for Cloud-Edge Collaborative SystemZhuanzhuan Liu, Yiming Liu, Xueyong Tan, Jing Liu. 1382-1387 [doi]
- VulDet-BC: Binary Software Vulnerability Detection Based on BiGRU and CNNXinxin Cai, Xin Chen 0032, Dongjing Yu, Xinjiang Ye, Fanrong Lv. 1388-1397 [doi]
- Performability Modeling and Analysis for Real-Time Object Detection on UAV SystemsQingyang Zhang, Fumio Machida, Ermeson C. Andrade. 1398-1405 [doi]
- FedAccess: Federated Learning-Based Built Surface Recognition for Wheelchair RoutingRochishnu Banerjee, Ethan Han, Longze Li, Haoxiang Yu, Md. Osman Gani, Vaskar Raychoudhury, Roger O. Smith. 1406-1415 [doi]
- Design and Implementation of an Agile Microservices-Based Intelligent Surveillance Platform with KubernetesChun-Hao Yang, Hei Man Fung, Meng-Hsun Tsai. 1416-1421 [doi]
- An Empirical Study on AI-Powered Edge Computing Architectures for Real-Time IoT ApplicationsAwatif Yasmin, Tarek Mahmud, Minakshi Debnath, Anne H. H. Ngu. 1422-1431 [doi]
- Identifying Which Clients Will Cancel Their Insurance Policy Machine Learning MethodsKate Narain, Yulei Pang. 1432-1435 [doi]
- WeBMO: WebAssembly Memory Bitwise Operation ObfuscationJeongpil Park, Eun-Sun Cho. 1436-1439 [doi]
- A Risk Assessment based RBAC using Attack Graphs to Mitigate Insider Threat during UAQShuvo Bardhan. 1440-1443 [doi]
- Fitness Monitoring System Based on Multimodal Perception and Rotation StrategyWangyuhao Li, Hideaki Miyaji, Hiroshi Yamamoto. 1444-1447 [doi]
- Trajectory-Aware Framework for Dynamic MEC Server Selection in 5G NetworksMassinissa Lakhdar Friha, Hideaki Miyaji, Hiroshi Yamamoto. 1448-1451 [doi]
- Proximity Verification Function of Real World Data Sources Based on Similarity Analysis on Environmental InformationMasashi Kobayashi, Hideaki Miyaji, Hiroshi Yamamoto. 1452-1455 [doi]
- An Evaluation of Time-Sliced GPU Sharing with KubeRay for Machine Learning WorkloadsPapon Choonhaklai, Kohei Ichikawa, Hajimu Iida. 1456-1459 [doi]
- An AR Visualization System of Near-Future Information to Avoid Dangerous SituationsTokiteru Ino, Tomoya Kawakami, Satoru Matsumoto, Tomoki Yoshihisa, Yuuichi Teranishi. 1460-1463 [doi]
- A Study on the Applicability of Graph Reduction to Evaluating the Robustness of Complex NetworksTomoya Matoba, Ryotaro Matsuo, Ryo Nakamura. 1464-1467 [doi]
- Machine Learning for the Recognition of Defects on the Surface of Film CapacitorsAyumu Narita, Teppei Shibata, Akira Fujii, Takanori Sato, Eduardo Carabez. 1468-1471 [doi]
- Opportunistic Network Routing Strategy Based On Node Sleep MechanismZhuoyuan Li, Danjie Bao, Xiaodong Xu, Feng Zhang, Gang Xu. 1472-1475 [doi]
- Wide-Range Sensor Network System by Limited Sensors Based on Various Image Analysis MethodMao Kubota, Hideaki Miyaji, Hiroshi Yamamoto. 1476-1479 [doi]
- Fine-Grained Classification of Researcher-Related Web Pages Using String and Contextual FeaturesHiroo Hayashi, Marie Katsurai. 1480-1483 [doi]
- Health Monitoring System for Desk Workers Using Non-Contact Multi-SensorsLi Zhenghan, Hideaki Miyaji, Hiroshi Yamamoto. 1484-1487 [doi]
- Exploring the Impact of a ChatGPT-Based Interactive System on Enhancing the Knowledge and Attitudes Towards Advance Care Planning in Older AdultsXin Yu Liao, Pin Hsuan Wang, I-Chiu Chang. 1488-1489 [doi]
- Enhancing Dengue Awareness: A Comprehensive System for Filtering Thai Social Media PostsJedsada Phengsuwan, Kamron Aroonrua, Krit Punpreuk, Naiyana Sahavechaphan. 1490-1491 [doi]
- Blurred Facial Recognition Based on AdaFaceQuan-Bin Zhang, Po-Yang Chi, Shang-Ze Lin, Chia-Xsuan Wu, Yi-Zeng Hsieh. 1492-1493 [doi]
- Enhancing Website Fraud Detection: A ChatGPT-Based Approach to Phishing DetectionMichael Schesny, Nico Lutz, Thomas Jägle, Felix Gerschner, Marco Klaiber, Andreas Theissler. 1494-1495 [doi]
- Distributed Threat Intelligence at the Edge Devices: A Large Language Model-Driven ApproachSyed Mhamudul Hasan, Alaa M. Alotaibi, Sajedul Talukder, Abdur R. Shahid. 1496-1497 [doi]
- A Method to Design SOA-Based Software Architecture and Goal Models from BPMN ModelsRedouane Blal, Abderrahmane Leshob, Hafedh Mili. 1498-1499 [doi]
- EPNATOP: an Operational Profile for Verifying Software Designs Based on EPNATTomohiko Takagi, Rikuto Otake, Sho Matsumoto. 1500-1501 [doi]
- Architecture Design and Implementation of a Security Threat Data Sharing PlatformChase Lamkin, Mst. Shapna Akter, Hossain Shahriar, Guillermo Francia. 1502-1503 [doi]
- Authentic Learning Approach for Data Poisoning Vulnerability in LLMsMst. Shapna Akter, Md. Abdur Rahman, Md. Mostafizur Rahman, Juanjose Rodriguez-Cardenas, Hossain Shahriar, Fan Wu 0013, Muhammad Rahman 0006. 1504-1505 [doi]
- Online Gaming Platform for Tibetan Jiu Chess: AI-vs-AI and Human-vs-HumanGan Xu, Xiali Li, Yanyin Zhang. 1506-1507 [doi]
- Detecting Video Surveillance Systems in Real-Time Through Wireless Traffic AnalysisHye Young An, Woojin Park, Soochang Park. 1508-1509 [doi]
- Transforming Security Policies in Firewalls Using the Shortest Editing Script AlgorithmMotoyuki Ohmori. 1510-1511 [doi]
- Effect of Retraining Graph Generative Models with Generated GraphsTakeru Inada, Sho Tsugawa, Akiko Manada, Kohei Watabe. 1512-1513 [doi]
- AI-based Occupancy Prediction using WiFi CSIMinWoo Chun, Sanghun Kim, Seunghyeon Park, Taekwon Chung, Kiwoong Kwon. 1514-1515 [doi]
- Survey of Technical and Soft Skills Learners Acquired in a Software Engineering Project CourseAtsuo Hazeyama. 1516-1517 [doi]
- Enhanced client-side internal load balancing for in 5G Online Charging SystemNgoc-Tien Nguyen, Van Duong Nguyen, Duc Hai Nguyen 0003, Ngoc Son Dinh, Thi Quynh Hoa Hoang, Cong Dan Pham. 1518-1519 [doi]
- Creativity Using Generative AI vs. Physical Modeling: A Case Study of Architecture Workshops in a SfHEIYimeng Wang, Derek S. Irwin, Dave Towey, Jing Xie. 1520-1521 [doi]
- FROM Syntax to Semantics: An OER-Powered SQL Learning and Visualisation ToolYuyan Zhou, Dave Towey, Matthew Pike. 1522-1523 [doi]
- Size-Insensitive Network for Visible-Infrared Image Fusion ModelYihan Zhang, Qian Zhang, Dave Towey. 1524-1525 [doi]
- Evaluation of Transformer-Based Encoder on Conditional Graph GenerationThamila E. H. Abeywickrama, Sho Tsugawa, Akiko Manada, Kohei Watabe. 1526-1527 [doi]
- FLEDGY: Federated Learning for Edge Devices Accommodating GPU DiversityAria Ghora Prabono, Yang Fan Goh, Mei Kobayashi. 1528-1529 [doi]
- Dynamic Opaque Predicate Detection with a Recursive Matching MethodHyeongchang Jeon, Seoksu Lee, Eun-Sun Cho. 1530-1531 [doi]
- Comprehensive Analysis of the Therapeutic Effects and Mechanisms of Herbal Medicine Through Network-Based MethodsYoung-Woo Kim, Seon Been Bak, Byung-Wook Lee, Seung-Wook Hong, Ki WookKim, Sun-Dong Park, Won Yung Lee. 1532-1533 [doi]
- An Automation Tool Converting Test Steps into Keywords for Automated Test DevelopmentZhen-Yang Guo, Zi-Long You, Shuo-Han Chen, Shiang-Jiun Chen, Chuan-Ming Liu. 1534-1535 [doi]
- Design and Evaluation of YOLOv7-Based License-Plate Recognition for Mobile Vehicles Using Notebook-Raspberry-PIHung-Yu Chien, Kuang-Yu Chao. 1536-1537 [doi]
- Minimizing FPS Degradation in Multi-Streaming Processing with YOLOTaekwon Chung, Seunghyeon Park, Sanghun Kim, Kiwoong Kwon. 1538-1539 [doi]
- Large Language Model Integrated Healthcare Cyber-Physical Systems ArchitectureMalithi Wanniarachchi Kankanamge, Syed Mhamudul Hasan, Abdur R. Shahid, Ning Yang. 1540-1541 [doi]
- Tackling Front-End Challenges: Strategies for Time-Series Data Retrieval and VisualizationNaiyana Sahavechaphan, Manot Rattananen, Jukkrapong Ponharn, Tanapon Yotanak, Krit Punpreuk, Kamron Aroonrua. 1542-1543 [doi]
- Rethinking UX for Diverse Digital ProficiencyNaiyana Sahavechaphan, Tanapon Yotanak, Manot Rattananen, Jukkrapong Ponharn, Asamaporn Chatrattikorn. 1544-1545 [doi]
- The Study of Student Program Analysis and Feedback SystemJong-Yih Kuo, Ti-Feng Hsieh, Yu-Hong Chen. 1546-1547 [doi]
- Enhancing Security of Generalization Methods Based on m-Invariance for Dynamic Data PublicationFusu Zhang, Yoko Kamidoi, Shin'ichi Wakabayashi. 1548-1549 [doi]
- A machine learning based on arithmetic optimization algorithm select the significant genesYu-Da Lin, Jun-Han Lin, Chiung-Wen Hsu, Sin-Hua Moi. 1550-1551 [doi]
- A Deep Learning Approach for Assessment of Breast Aesthetic Score and Keypoint LocalizationJin Byeong Park, Myeongju Kim, Joseph Kyu-Hyung Park, Yujin Myung. 1552-1553 [doi]
- Privacy Preserved Achievement Method for OCSP Status and Supported Protocols in Full-DoH ArchitectureSatoru Sunahara, Yong Jin, Katsuyoshi Iida, Nariyoshi Yamai, Yoshiaki Takai. 1554-1555 [doi]
- Implementation of Dynamic Round Robin Scheduling on Bare-Metal Shallow Multi-OS for Lightweighted MicrocontrollersMinjung Kim, Daejin Park. 1556-1557 [doi]
- Ethical Analysis of AI-Enhanced Audiovisual Translation ToolsIulia Mihalache. 1558-1559 [doi]
- Day-Ahead Scheduling Optimization for Energy Saving in Microgrid with PV-ESSSeunghyeon Park, Yongho Kim, Kiwoong Kwon. 1560-1561 [doi]
- Privacy by Design: Proposing a Generic Framework for Privacy Compliant Experiment Repository ToolAbid Hussain, Lester Allan Lasrado. 1562-1563 [doi]
- Validating Smart Contracts Using GPT AssistantXianhao Zhang, Zhiyuan Wei, Jing Sun, Zijian Zhang, Zixiao Zhao. 1564-1565 [doi]
- Raw and Artificially Generated Data to Improve the Development of Brain-Computer Interfaces: Proof of ConceptEduardo Carabez, Takanori Sato, Isao Nambu. 1566-1567 [doi]
- Goal-Oriented Modeling in Fault Tolerant Service-Oriented Multi-Agent SystemsElena Troubitsyna. 1568-1569 [doi]
- An Innovative Method for Efficient Coverage Data Reduction in Multiple Fault LocalizationChih-Chiang Fang, Chin-Yu Huang. 1570-1571 [doi]
- An Evaluation of Sharding Protocol with Uneven Nodes SettingsYue Su, Yang Xiang, Kien Nguyen 0002, Hiroo Sekiya. 1572-1573 [doi]
- Advanced ML Approaches to PGx Recommendations in Precision MedicineMichael Zastrozhin, Danika Gupta, Nisha Talagala, Jason Akram, Roman Grachev, Allan Gobbs, Nasreen Karaf, Alex Timoshenko. 1574-1575 [doi]
- Driver Gene Expression Clustering Model for Prognostic Risk Estimation Using Cancer Genomic DataSin-Hua Moi, Yu-Da Lin, Yi-ling Chen, Chao-Ming Hung, Shin-Jiun Tsai, Wei Hong Cheng. 1576-1577 [doi]
- Implementing a PHP API Gateway Based on Microservices ArchitectureWen-Tin Lee, Ming-Kai Tsai. 1578-1579 [doi]
- A Web-based Visualization System for Operating System Resource ManagementTing-Yu Su, Mei-Ling Chiang, Sih-Bei Chen, Yun-Han Hsu, Hsiao-Tung Yang, Run-An Yeh. 1580-1585 [doi]
- Proposal of a Scalable Building Operating System Architecture and Data Model Toward Software-Defined BuildingKoichi Owaki, Matsuki Yamamoto, Nattaon Techasarntikul, Yuichi Ohsita, Hideyuki Shimonishi, Kouki Higashioka, Yoshihisa Toshima, Takanori Ogura, Shinji Shimojo. 1586-1591 [doi]
- Assessing Initial Attacks and Defense with Retry Function in MQTT Over QUICShin Hitomi, Ismail Arai, Arata Endo, Masatoshi Kakiuchi, Kazutoshi Fujikawa. 1592-1597 [doi]
- Meeting Latency and Jitter Demands of Beyond 5G Networking Era: Are CNFs Up to the Challenge?Adil Bin Bhutto, Ryota Kawashima, Yuzo Taenaka, Youki Kadobayashi. 1598-1605 [doi]
- Students' Perspectives on AI Code Completion: Benefits and ChallengesWannita Takerngsaksiri, Cleshan Warusavitarne, Christian Yaacoub, Matthew Hee Keng Hou, Chakkrit Tantithamthavorn. 1606-1611 [doi]
- Extraction of Subjective Information from Large Language ModelsAtsuya Kobayashi, Saneyasu Yamaguchi. 1612-1617 [doi]
- Semantic Segmentation in Aerial Imagery: A Novel Approach for Urban Planning and DevelopmentPawan Chinnari, Soumen Sinha, Budonkayala Ishaa, Neha Bharill, Om Prakash Patel. 1618-1623 [doi]
- LiCAFeL-STC: A Lightweight Cluster-Based Federated Learning Framework for Sensor-Based Human Activity Recognition Using Unlabeled Data in Heterogeneous Wearable DevicesTori Bukit, Bernardo Nugroho Yahya, Seok-Lyong Lee. 1624-1629 [doi]
- Noninvasive ML-Based BUN Prediction from Ten-Second Fingertip Video Using Generative AIParama Sridevi, Kazi Zawad Arefin, Dipranjan Das, Rumi Ahmed Khan, Sheikh Iqbal Ahamed. 1630-1635 [doi]
- ALRA: Adaptive Low-Rank Approximations for Neural Network PruningSoumen Sinha, Rajen Kumar Sinha. 1636-1641 [doi]
- Bat Algorithm for Attractor Reconstruction of Low-Dimensional Chaotic Maps from Time SeriesAkemi Gálvez, Sara Pérez-Carabaza, Andrés Iglesias 0001. 1642-1647 [doi]
- Enhancing Team Diversity with Generative AI: A Novel Project Management FrameworkJohnny Chan, Yuming Li. 1648-1652 [doi]
- FireSense: Integrating Deep Learning with ESP32 Microcontrollers for Enhanced Forest Fire SurveillanceRohan Arunkumar, Atul Dubey. 1653-1658 [doi]
- Open-Source Text-to-Image Models: Evaluation using Metrics and Human PerceptionAylin Yamac, Dilan Genc, Esra Zaman, Felix Gerschner, Marco Klaiber, Andreas Theissler. 1659-1664 [doi]
- Federated Learning Framework for Collaborative Time Series Anomaly Detection on Distributed MachinesIgnatius Iwan, Tori Bukit, Bernardo Nugroho Yahya, Seok-Lyong Lee. 1665-1670 [doi]
- Hybrid Consensus Networks for Scalable and Secure Internet of VehiclesMohammad Fardad, Elham Mohammadzadeh Mianji, Gabriel-Miro Muntean, Irina Tal. 1671-1676 [doi]
- Distributed Ledger Technology as a Tool for Voluntary Standardization Compliance in Emerging Technologies: A Legal ViewDimitar Kyosev, Alis Grave Nil. 1677-1680 [doi]
- Secure and Decentralized Collaboration in Oncology: A Blockchain Approach to Tumor SegmentationRamin Ranjbarzadeh, Ayse Keles, Martin Crane, Shokofeh Anari, Malika Bendechache. 1681-1686 [doi]
- Geopolitical Manoeuvring in Blockchain Standardization: A Comparative Analysis of the EU and U.S. ApproachesRuochen Qi, Dong-hyu Kim. 1687-1692 [doi]
- MemFlex: A Hybrid Memory System to Boost Cost of Ownership in Data CentersChandranil Chakraborttii, Mohammad Maminur Islam. 1693-1698 [doi]
- Stationary Human Detection Method Using 2D LiDARHaruki Mochizuki, Ryozo Kiyohara. 1699-1704 [doi]
- Interaction in Virtual Environments Using Smartwatches: A Comparative Usability Study Between Continuous Gesture Recognition and MDDTWMurillo Castro, Pedro Gomes, Fabrízzio Soares, Luciana Cardoso, Renan V. Aranha, Thamer Horbylon Nascimento. 1705-1710 [doi]
- Enhancing Road Safety Through Cost-Effective, Real-Time Monitoring of Driver Awareness with Resource-Constrained IoT DevicesAhmed Imteaj, Tanveer Rahman, Saika Zaman, Md. Zarif Hossain, Abdur R. Shahid. 1711-1720 [doi]
- Computer-Assisted English Presentation Learning System Based on Word Stress in PronunciationYugo Tagami, Takako Kojima, Saneyasu Yamaguchi. 1721-1725 [doi]
- A Safe Vehicle Routing System based on Road Characteristics from Telematics DataHiroshi Tei, Tomoya Kawakami, Yoshimi Kawamoto. 1726-1731 [doi]
- Feasibility Assessment of Denial-of-Service Attacks by Analyzing SOME/IP-SD State Transition ModelsKazuki Iehira, Hiroyuki Inoue. 1732-1738 [doi]
- The Accuracy of Domain Specific and Descriptive Analysis Generated by Large Language ModelsDenish Omondi Otieno, Faranak Abri, Sima Siami-Namini, Akbar Siami Namin. 1739-1746 [doi]
- Deep Learning Empowered High Accuracy and Low Complexity Indoor Channel Prediction for Wireless Communication SystemsRong-Terng Juang, Tong-wen Wang, Jun-Xiang Cao, Hsin-Piao Lin, Ding-Bing Lin. 1747-1751 [doi]
- Neural Network Fuzzy Electricity Demand Forecasts Based on Fuzzy InputsSulalitha Bowala, Md. Erfanul Hoque, Aerambamoorthy Thavaneswaran, Ruppa K. Thulasiram, Srimantoorao Semischetty Appadoo. 1752-1757 [doi]
- Application of a Novel Fuzzy Pattern Mining Algorithm for Sequence DataThimani Ranathungage, Sulalitha Bowala, Md. Erfanul Hoque, Aerambamoorthy Thavaneswaran, Ruppa K. Thulasiram. 1758-1763 [doi]
- Relative Performance Prediction Using Few-Shot LearningArunavo Dey, Aakash Dhakal, Tanzima Z. Islam, Jae-Seung Yeom, Tapasya Patki, Daniel Nichols, Alexander Movsesyan, Abhinav Bhatele. 1764-1769 [doi]
- Audio Classification with Semi-Supervised Contrastive Loss and Consistency RegularizationJuan-Wei Xu, Yi-Ren Yeh. 1770-1775 [doi]
- Analyzing the Characteristics of Ego-Network Structures of Influential Twitter UsersYuto Nakamitsu, Sho Tsugawa, Keiichiro Tsukamoto, Shintaro Igari. 1776-1781 [doi]
- Maintaining Performance of a Machine Learning System Against Imperfect RetrainingZhengji Wang, Fumio Machida. 1782-1787 [doi]
- A Location Analytics Algorithm to Analyze Geographic and Demographic Data for Restaurant AnalyticsChang Geng, Griffin LaFreniere, Huy Khanh Le, Carson K. Leung, Quinn Chao Wong, Alfredo Cuzzocrea. 1788-1793 [doi]
- A Sharded Blockchain Architecture for Healthcare DataJahanzeb Shahid, Stelvio Cimato, Muhammad Zia. 1794-1799 [doi]
- An Environmental Data Science Solution for Data Analytics Exploration of Traffic Interaction on Air QualityGarik Avagyan, Juan C. Armijos, Carson K. Leung, Jasmine J. Tabuzo, Aivee F. Teodocio, Alfredo Cuzzocrea. 1800-1805 [doi]
- Synchronous Set-Based Particle Swarm Optimization: Heuristics for Portfolio OptimizationAshish Lakhmani, Ruppa K. Thulasiram, Parimala Thulasiraman. 1806-1812 [doi]
- Novel Non-linear Adaptive Fuzzy Adjacency Matrices for Financial Volatility Network ModelsAvanthi Saumyamala, Sulalitha Bowala, You Liang, Shanika Basnayake, Aerambamoorthy Thavaneswaran, Ruppa K. Thulasiram. 1813-1818 [doi]
- Visualization of Crowd Contamination Simulations Using Immersive Virtual RealityVinicius Chrisosthemos Teixeira, Gabriel Fonseca Silva, Isabel H. Manssour, Soraia H. Musse, Márcio Sarroglia Pinho. 1819-1824 [doi]
- Transferring Knowledge from 12-Lead to 1-Lead ECGs via Contrastive LearningSergey Skorik, Aram Avetisyan, Ekaterina Diatlinko, Renata Mindiiarova, Yury Markin. 1825-1830 [doi]
- Using Echocardiography and AI to Predict Cardiac Biological AgeAnastasia A. Kobelyatskaya, Zulfiya G. Guvatova, Olga N. Tkacheva, Fedor I. Isaev, Anastasiia L. Kungurtseva, Alisa V. Vitebskaya, Ekaterina V. Plokhova, Lubov V. Machekhina, Irina D. Strazhesko, Alexey A. Moskalev. 1831-1834 [doi]
- A Comparative Study of Classical and Quantum Algorithms for Heart Disease Prediction Using Patients' Vital SignsParamita Basak Upama, Parama Sridevi, Masud Rabbani, Mohammad Syam, Abul Hasan Muhammad Bashar, Md. Rubaiyat H. Mondal, Rumi Ahmed Khan, Sheikh Iqbal Ahamed. 1835-1840 [doi]
- E-SMOTE: Entropy Based Minority Oversampling for Heart Failure and AIDS Clinical Trails AnalysisSainath Veerla, Anbu Valluvan Devadasan, Mohammad Masum, Mohammed Chowdhury, Hossain Shahriar. 1841-1846 [doi]
- Cardiac Age Estimation Using Genetic and Sphygmographic DataMikhail Ivanchenko, Elena Kondakova, Igor I. Yusipov, Alena I. Kalyakulina. 1847-1849 [doi]
- Breaking Barriers in Stress Detection: An Inter-Subject Approach Using ECG SignalsShahane Tigranyan, Arman Martirosyan. 1850-1855 [doi]
- Explaining Health Risk Behaviors in the U.S. with Social Deprivation at Local and Regional LevelsSwapna S. Gokhale, Viswadeep Lebakula, Alina Peluso. 1856-1864 [doi]
- A Screening Method for Left Ventricular Systolic Dysfunction by Single-Channel Electrocardiogram Using Machine Learning AlgorithmsNatalia Kuznetsova, Alexander Suvorov, Petr Chomakhidze, Philippe Kopylov. 1865-1867 [doi]
- Application of Artificial Intelligence Technology to Prevent Sudden Cardiac DeathHelena Godunova, Sergei P. Prokhorov. 1868-1871 [doi]
- Enhancing Mental Health Care with the Kalman Filter: Predictions, Monitoring, and PersonalizationSyed Azizur Rahman, Khaled Obaideen, Mohammad AlShabi 0001, Nabeel Al-Yateem. 1872-1876 [doi]
- Exploring New Digital Health-Care Frontiers: Ingenuity and Vision from Saudi Arabia in Establishing a National Military Health Control and Command CentreManalbint Abdullah Aladaili, Richard Mottershead. 1880-1882 [doi]
- Exploring New Horizons in Dental Education: Leveraging AI and the Metaverse for Innovative Learning StrategiesAmina Al-Marzouqi, Anissa Bettayeb, Syed Azizur Rahman, Said A. Salloum, Nabeel Al-Yateem. 1881-1886 [doi]
- Revolutionizing Healthcare Management: Architecture of a Web-based Medical Triage ServiceAhmed A. Harby, Eyad ElKhodary, Ronan Almeida, Drishti Sharma, Farhana Zulkernine, Furkan Alaca, Khalid Elgazzar, Amina Al-Marzouqi, Nabeel Al-Yateem, Syed Azizur Rahman. 1887-1894 [doi]
- Optimization of Electronic Health Record Through Local & International Standards: A Case from United Arab EmiratesAl Ounoud Al Marzouqi. 1895-1900 [doi]
- Assist-Bot: A Voice-Enabled Assistant for SeniorsYuhao Chen, Jiahao Cai, Siyu Chen, Farhana H. Zulkernine, Nauman Jaffar, Amina Al-Marzouqi, Nabeel Al-Yateem, Syed Azizur Rahman. 1901-1906 [doi]
- Factors Influencing Public Trust in Emergency Health Helplines in BangladeshMohammad Aminul Islam, Ahmed Hossain, Syed Azizur Rahman. 1907-1912 [doi]
- Implementing Electronic Medical Record (EMR) Technology in Hospital Setting: A Qualitative StudyMuhammad Arsyad Subu, Aan Sutandi, Nabeel Al-Yateem, Zakiyah Zakiyah, Aliana Dewi, Richard Mottershead, Erika Lubis, Mohammad Al-Shabi, Maryuni Maryuni, Sari Narulita, Fatma Refaat Ahmed, Henny Suzana Mediani, Syed Azizur Rahman, Mochamad Robby Fajar Cahya. 1913-1919 [doi]
- An Exploration of E-Puskesmas Technology Application in Indonesian Public Health Centers: A Qualitative StudyMuhammad Arsyad Subu, Jacqueline Maria Dias, Fatma Refaat Ahmed, Widanarti Setyaningsih, Richard Mottershead, Syed Azizur Rahman, Sari Narulita, Mohammad AlShabi 0001, Aliana Dewi, Aan Sutandi, Zakiyah Zakiyah, Henny Suzana Mediani, Maryuni Maryuni, Ulfah Nuraeni Karim, Nabeel Al-Yateem. 1920-1926 [doi]
- Health Sciences students and educators experience with using ChatGPTFatma Refaat Ahmed, Nabeel Al-Yateem, Esraa Rushdan, Ahmad Rajeh Saifan, Syed Azizur Rahman, Richard Mottershead, Heba Hesham Hijazi, Muhammad Arsyad Subu, Wegdan Bani-Issa, Jacqueline Maria Dias, Mohannad Eid AbuRuz. 1926-1928 [doi]
- Assessing the Efficacy of Telephone Telemedicine in Enhancing Follow-up Visits for Non-Adherence Hypertensive Patients: A Cross-Sectional Study in Northern BangladeshAhmed Hossain, Mohammad Zakir Hossain, Mohammad Anwar Hossain 0003, Syed Azizur Rahman, Heba Hesham Hijazi, Mohamad Alameddine, Amina Al-Marzouqi. 1929-1933 [doi]
- Advancements in Multimodal Social Media Post Summarization: Integrating GPT-4 for Enhanced UnderstandingMd Jahangir Alam 0003, Ismail Hossain, Sai Puppala, Sajedul Talukder. 1934-1940 [doi]
- Nurses' Perceptions about Champs Tool Trials In The Pediatric WardSiswani Marianna, Yoanita Hijriyati, Handayani Handayani, Muhammad Arsyad Subu, Mochamad Robby Fajar Cahya, Widanarti Setyaningsih, Nabeel Al-Yateem, Maryuni Maryuni, Ananda Tio Panggabean, Richard Mottershead, Fatma Refaat Ahmed, Sari Narulita, Agung Setiadi, Syed Azizur Rahman, Mohammad Al-Shabi. 1941-1944 [doi]
- SCAN: A HealthCare Personalized ChatBot with Federated Learning Based GPTSai Puppala, Ismail Hossain, Md Jahangir Alam 0003, Sajedul Talukder. 1945-1951 [doi]
- Automatic Structuring of Radiology Reports of Chest X-Ray Images Using Large Language ModelMizuho Nishio, Hidetoshi Matsuo, Takaaki Matsunaga. 1952-1954 [doi]
- On the Use of Gaussian Process Regression and Multiple Imputation in Cox Regression Models with Time-Dependent CovariatesKenta Tanaka, Tomoyuki Sugimoto. 1955-1960 [doi]
- Research on the Efficiency of Operating Room Management Through Numerical Optimization and Matters to be Considered in the ProcessOnishi Tatsuki, Casanova Carlos. 1961-1964 [doi]
- 4: Multi-View Attention Networks for Mammography Cancer ClassificationAlisher Ibragimov, Sofya Senotrusova, Arsenii Litvinov, Egor Ushakov, Evgeny Karpulevich, Yury Markin. 1965-1970 [doi]
- Similar Mask Retrieval with Contrastive Learning for Single Domain Generalization in Medical ImagingIzumi Ogura, Chisako Muramatsu. 1971-1974 [doi]
- Statistical Review of Regulatory Requirements for AI DiagnosisNaoki Ishizuka. 1975-1976 [doi]
- Multiview Machine Learning Classification of Tooth Extraction in Orthodontics Using Intraoral ScansCarlos Falcão de Azevedo Gomes, Adriel Silva de Araújo, Sunna Imtiaz Ahmad, Maurício Cecílio Magnaguagno, Vinicius Crisosthemos Teixeira, Anushri Singh Rajapuri, Quinn Roederer, Dalvan Griebler, Vinicius Dutra, Hakan Turkkahraman, Márcio Sarroglia Pinho. 1977-1982 [doi]
- Three-Branch Molecular Representation Learning Framework for Predicting Molecular Properties in Drug DiscoveryYu Liu, Lihui Duo, Jonathan D. Hirst, Jianfeng Rent, Bencan Tang, Dave Towey. 1983-1989 [doi]
- Early Recurrence Detection of Invasive Ductal Carcinoma Utilizing High-Dimensional Genomic DataRohan Kaushikan. 1990-1995 [doi]
- Efficient Pooling Designs and Screening Performance in Group Testing for Two Types of DefectivesHiroyasu Matsushima, Yusuke Tajima, Xiao-Nan Lu, Masakazu Jimbo. 1996-2000 [doi]
- Machine Learning-Based Early Detection and Intervention for Mental Health Issues in ChildrenSriteja Kataru, Kathleen King, Lachin Fernando. 2001-2007 [doi]
- Improving Insurance Fraud Detection With Generated DataKiet Ha, Lucas Stowe, Chandranil Chakraborttii. 2008-2013 [doi]
- A Blind Color Image Watermarking for Grayscale Watermark Based on Tensor DecompositionKaito Hosono, Tetsuya Morizumi, Hirotsugu Kinoshita, Sumiko Miyata. 2014-2019 [doi]
- Employee Perceptions of Privacy and Data Control in Workplace Wellness e- Health ProgramsOihane Gómez-Carmona, Diego Casado Mansilla, Diego López-de-Ipiña, Javier García Zubía. 2020-2025 [doi]
- Shaping the Future of Energy Markets: Federated Systems and Blockchain SynergySilvio Meneguzzo, Stefano Bergia, Alfredo Favenza, Claudio Schifanella, Alessandro Mozzato, Valentina Gatteschi. 2026-2031 [doi]
- Based on Stacked Attention Network for Chinese Medical Named Entity RecognitionTao Gu, Zhichao Zhu, Qing Zhao 0005. 2032-2037 [doi]
- Leveraging Machine Learning to Identify Effective Teaching Strategies for Children With Autism Spectrum DisorderSavar Toteja, Pallavi Bajpai. 2038-2043 [doi]
- GetEmotion: A Data Collection Tool for Building an Affective Haptic DatasetCymon Radjh Nadela, Irah Faye Oliva, Christopher Josh Quinzon, Merlin Teodosia Suarez. 2044-2053 [doi]
- Physiological Correlates While Playing Tetris: A Comparative Study Between Males and FemalesYusuke Sato, Ahmed Salem, Kaoru Sumi. 2054-2059 [doi]
- Development of a Virtual Travel System to Enhance the Discovery of Aspiration and PleasureTetsunari Inamura, Reiko Gotoh, Madoka Matsumoto. 2060-2064 [doi]
- Experiential Learning System with Generative Art Using Virtual SpacesShun Furuichi, Kaoru Sumi. 2065-2070 [doi]
- Analysis of Verbal and Nonverbal Behaviors in Online Bibliobattle Focusing on Listener ResponsesAkihiro Nagai, Yasuyuki Sumi. 2071-2076 [doi]
- Advancing Arousal and Valence Prediction in Virtual Reality Through Sentiment Analysis IntegrationAllison Bayro, Heejin Jeong. 2077-2082 [doi]
- Psychophysiological Correlates of Embarrassment Emotion: A Comparative Study Between Shy Males and FemalesAhmed Salem, Kaoru Sumi. 2083-2088 [doi]
- Self-Instructional Training Interface Using a Speech Bubble That Facilitates Users to Internalize the Automatically Generated TextsKei Hyodo, Tomonori Kubota, Satoshi Sato, Kohei Ogawa. 2089-2094 [doi]
- The Impact of Anonymity on Communication in the MetaverseYoshifuru Nakayama, Kaoru Sumi. 2095-2100 [doi]
- Enhancing Persuasion Through Emotional Elicitation in Digital Marketing: A Cross-Cultural Comparative StudyPinkie Anggia, Kaoru Sumi. 2101-2106 [doi]
- Evaluation of Cybernetic Avatar Operations in Three Different Types of Viewpoints for Optimizing Operator Usability and ComfortNitchan Jianwattanapaisarn, Akira Utsumi, Takahiro Miyashita. 2107-2112 [doi]
- Attention to Key Fundus Features: A Prior Knowledge-Guided Deep Learning Network for Pediatric High Myopia DetectionWenxiu Cheng, Jianqiang Li 0002, Xi Xu, Haoran Peng, Linna Zhao, Suqin Liu, Chujie Zhu, Fujiu Xu. 2113-2118 [doi]
- Investigating Radiological Diagnosis Through Smartphone-Based Virtual Reality Applications: A User StudyRenan Trévia, Vinicius Chrisosthemos Teixeira, Márcio Sarroglia Pinho. 2119-2124 [doi]
- Application of a Bacterial Image Analysis System for Antibiotic Susceptibility Test DetectionCheng-Yu Ye, Cheng-Kai Huang, Meng-Hua Yen. 2125-2130 [doi]
- Research of AI Driven Light Health and TherapyXiaofei Wang, Yi Zhao, Tao Yu, Jie Ren, Huafeng Yan, Jian Song. 2131-2134 [doi]
- MTL-DQA: Multi-Task Learning with Psychological Indicators for Enhanced Quality in Depression Community QA SystemYangliao Li, Qing Zhao, JianQiang Li, Bing Xiang Yang, Ruiyu Xia, Hongzhi Qi. 2135-2140 [doi]
- How to Advance Eye Image Segmentation for Accurate Myasthenia Diagnosis? an Empirical Study of Boundary LossChujie Zhu, Jianqiang Li 0002, Ji-Jiang Yang, Wenxiu Cheng, Linna Zhao, Suqin Liu, Jingchen Zou, Shuhan Wang, Xi Xu. 2141-2146 [doi]
- Research on Breast Lesion Localization and Diagnosis Based on Knowledge-Driven and Data-Driven ApproachLintao Song, JianQiang Li, Xiaoling Liu, Yiming Liu, Tianbao Ma, Jun Bai, Linna Zhao, Qing Zhao 0005, Xi Xu. 2147-2152 [doi]
- Similarity Calculation Model Between Patients with Chinese Electronic Medical Records Based on Multi-View Hierarchical Leaning NetworkHuina Wang, Jianqiang Li 0002, Bo Liu 0024, Jinshu Li, Junqi Long. 2153-2158 [doi]
- Covid-IRLNet: A COVID-19 Diagnostic Model For Extracting CT Image Features and CT Sequence FeaturesJingxiang Xu, Jianqiang Li 0002, Juan Li, Linna Zhao, Shujie Ding. 2159-2164 [doi]
- Self-Adaptive System Implementation Framework Considering Execution Time UncertaintyAtsushi Naito, Hiroyuki Nakagawa, Tatsuhiro Tsuchiya. 2165-2170 [doi]
- Trace and Algebraic Semantics for Partial Store Order Memory ModelJunfu Luo, Lili Xiao, Huibiao Zhu, Ziqing Su. 2171-2176 [doi]
- Formal Verification and Security Analysis of AMQPHuiying Liu, Wenting Dong, Huibiao Zhu, Ziqing Su. 2177-2182 [doi]
- Formalization and Verification of Percolator Using CSPChenhui Wang, Ziqing Su, Huibiao Zhu. 2183-2188 [doi]
- WatchOverGPT: A Framework for Real-Time Crime Detection and Response Using Wearable Camera and Large Language ModelAbdur R. Shahid, Syed Mhamudul Hasan, Malithi Wanniarachchi Kankanamge, Md. Zarif Hossain, Ahmed Imteaj. 2189-2194 [doi]
- ZT-OTA Update Framework for IoT Devices Toward Zero Trust IoTNobuo Aoki, Atsuko Takefusa, Yutaka Ishikawa, Yasushi Ono, Eisaku Sakane, Kento Aida. 2195-2202 [doi]
- A Contextual Approach for Improving Anomalous Network Traffic Flows PredictionEilaf M. A Babai, Koji Okamura. 2203-2208 [doi]
- DDoS Attack Information Sharing Among CDNs Interconnected Through CDNIKazuki Takashima, Daisuke Kotani, Yasuo Okabe. 2209-2214 [doi]
- Practical Performance of a Distributed Processing Framework for Machine-Learning-based NIDSMaho Kajiura, Junya Nakamura 0001. 2215-2221 [doi]
- Online Coding Tutorial Systems: A New Category of Programming Learning PlatformsOhud Abdullah Alasmari, Jeremy Singer, Mireilla Bikanga Ada. 2222-2227 [doi]
- Top 10 Computer Science Open Educational Resources in MERLOTHenry C. B. Chan, Tak-Lam Wong, Parkash Lohana, Simanta Mitra, Joseph C. H. So. 2228-2232 [doi]
- Using Convolutional Neural Network to Epilepsy Brainwave RecognitionYi-Hsiu Tsai, Chin-Hung Chang, Yan-Heng Lin, Ta-Cheng Chen, Chu-Ling Chen, Hong-Jie Jhou, Wen Chien Huang, Fang-Ju Lin, Dann-Pyng Shih. 2233-2237 [doi]
- An Automated Detection and Classification System of Calcaneal Fracture with Deep Learning TechniquesYi-Cyuan Tseng, Wei-En Hsu, Yu-An Chen, Yu-Wei Chan, Shih-Ting Ciou, Shun-Ping Wang. 2238-2241 [doi]
- LASG: Streamlining Legal Adjudication with AI-Enabled Summary GenerationYi-Hung Liu, Yi-Fun Lin. 2242-2247 [doi]
- Can Large Language Model Aid in Generating Properties for UPPAAL Timed Automata? A Case StudyHan-Wei Wu, Shin-Jie Lee. 2248-2253 [doi]
- Research on Security Enhancement Methods of Internet of Things Communication-Based on Whitelist and Encryption Key ExchangeTse-Chuan Hsu, Han-Sheng Lu. 2254-2259 [doi]
- By Machine Learning Techniques Predicting Post-COVID-19 ConditionPei-Rong Huang, Chih-Hung Chang, Wen-Ching Chen, Che-Lun Hung, Po-Yu Liu, Ting-Kuang Yeh, Hsiu-Wen Wang, Yu Chun Yen, William Cheng-Chung Chu. 2260-2265 [doi]
- Enhancing Cutting Sound Quality in Tool Wear Monitoring via Hybrid Domain Loss UNet NetworkJian-Wen Chen, Meng-Shiun Tsai, Che-Lun Hung. 2266-2271 [doi]
- An Accurate and Robust Matching Network for Full/Partial Point Cloud RegistrationMin-Kuan Chang, Chi-Sheng Yang, Yu-Fang Chang, Huan Chen, Kuo-Guan Wu. 2272-2277 [doi]
- Experimental Study on the Accuracy and Precision of Object Size Measurement with Dual-Lens Imaging SystemsTse-Chuan Hsu, Yu-Chia Cheng. 2278-2283 [doi]
- Exploring Drum Percussion Simulation with Gesture Recognition and Smartwatches for Interactive DuetsPedro Gomes, Murillo Castro, Fabrízzio Soares, Luciana Cardoso, Renan Aranha, Thamer Horbylon Nascimento. 2284-2289 [doi]
- Chatbotification for Web Information Systems: A Pattern-Based ApproachYan-Cih Liang, Shang-Pin Ma, Chih-Ying Lin. 2290-2295 [doi]
- A Clustering-Based Approach for Detecting Low-Contrast Texts on Web Pages at the Granular Character LevelEng-Shen Tu, Shin-Jie Lee. 2296-2301 [doi]
- A Latency Aware and Dynamic Caching Model for Heterogeneous Datalake EnvironmentsDeepika Saxena, Ashutosh Kumar Singh 0001, Volker Lindenstruth. 2302-2307 [doi]
- A New Pipeline for Generating Instruction Dataset via RAG and Self Fine-TuningChih-Wei Sung, Yu-Kai Lee, Yin-Te Tsai. 2308-2312 [doi]
- HOSHMAND: Accelerated AI-Driven Scheduler Emulating Conventional Task Distribution Techniques for Cloud WorkloadsMichael Bidollahkhani, Aasish Kumar Sharma, Julian M. Kunkel. 2313-2320 [doi]
- A Cross-Organizational Identity Proofing System for Seamless Online ID Re-Binding Leveraging Individual Number CardsSayako Shimizu, Hiroyuki Sato, Motonori Nakamura, Hukofumi Suzuki, Yasuo Okabe. 2321-2326 [doi]
- Achieving Third-party Deniability in Signature-based Credential SystemsMagdalena Bertram, Maximilian Richter, Marian Margraf. 2327-2333 [doi]
- A SOLID-Based Framework for Supporting Privacy-Preserving Identity Management in Multi-Cloud EnvironmentsAlfredo Cuzzocrea, Islam Belmerabet. 2334-2340 [doi]
- Standard-Driven Software Component Reuse and Agile TestingYunxiao Ma, Mingyue Li, Aliya Bao, Chengyuan Tian, Li Hua. 2341-2346 [doi]
- Code Generation Using Self-Interactive AssistantZixiao Zhao, Jing Sun 0002, Cheng-Hao Cai, Zhiyuan Wei. 2347-2352 [doi]
- Model-Driven Engineering for Quantum Programming: A Case Study on Ground State Energy CalculationFurkan Polat, Hasan Tuncer, Armin Moin, Moharram Challenger. 2353-2360 [doi]
- Cloud Memory Enabled Code Generation via Online Computing for Seamless Edge AI OperationMyeongjin Kang, Daejin Park. 2361-2368 [doi]
- Communication Performance Evaluation Using Compression Processing for IoT Systems in Mobile EnvironmentsChisa Ito, Atsuko Takefusa, Hidemoto Nakada, Masato Oguchi. 2369-2374 [doi]
- An Empirical Study of Fault Localization on Novice ProgramsYuxing Liu, Jianying Chen, Jiamin Tang, Xiaoyi Tong, Liping Cai, Hengyuan Liu. 2375-2380 [doi]
- Explicable Machine Learning Models Using Rich Geospatial DataAaron Bramson, Masayoshi Mita. 2381-2386 [doi]
- Facilitating the Process Rate of Difference Determination within HTML after Web Page EventsZhen-Yang Guo, Yu-Siang Liao, Shuo-Han Chen, Chuan-Ming Liu. 2387-2392 [doi]
- Enabling Effective Metamorphic- Relation Generation by Novice Testers: A Pilot StudyYifan Zhang, Dave Towey, Matthew Pike. 2393-2398 [doi]
- A Threat Analysis of Cooperative Intelligent Transport Systems: C-Roads ScenariosGabriele Gatti, Marco Civera, Cataldo Basile, Massimiliano Masi, Michele La Manna. 2399-2405 [doi]
- A Chat Application on a Bare InternetFahad Alotaibi, Ramesh K. Karne, Alexander L. Wijesinha, Nirmala Soundararajan, Abhishek Rangi. 2406-2411 [doi]
- Call Graph Delta Analysis and Security Vulnerability Assessment with Static AnalysisHasan Sözer. 2412-2417 [doi]
- Authentic Learning on DevOps Security with Labware: Git Hooks To Facilitate Automated Security Static AnalysisMd. Mostafizur Rahman, Abdul Barek, Mst. Shapna Akter, ABM Kamrul Islam Riad, Md. Abdur Rahman, Hossain Shahriar, Akond Rahman, Fan Wu 0013. 2418-2423 [doi]
- Mitigating Insecure Outputs in Large Language Models(LLMs): A Practical Educational ModuleAbdul Barek, Md. Mostafizur Rahman, Mst. Shapna Akter, ABM Kamrul Islam Riad, Md. Abdur Rahman, Hossain Shahriar, Akond Rahman, Fan Wu 0013. 2424-2429 [doi]
- Enhancing HIPAA Compliance in AI-driven mHealth Devices Security and PrivacyABM Kamrul Islam Riad, Abdul Barek, Md. Mostafizur Rahman, Mst. Shapna Akter, Tahia Islam, Md. Abdur Rahman, Md Raihan Mia, Hossain Shahriar, Fan Wu 0013, Sheikh Iqbal Ahamed. 2430-2435 [doi]
- Hexagon: Generating Asynchronous Microservices Benchmarks for the Evaluation of Anomaly Propagation ResistanceHiroki Hanada, Keisuke Ishibashi. 2436-2441 [doi]
- Improving ML-based Solutions for Linking of CVE to MITRE ATT &CK TechniquesSaad El Jaouhari, Nouredine Tamani, Rohan Isaac Jacob. 2442-2447 [doi]
- Towards Anomaly Detection in Embedded Systems Application Using LLVM PassesSirine Ilahi, Adebayo Omotosho, Christian Hammer 0001. 2448-2453 [doi]
- Formal Support for Threat Modeling with Attack Decision DiagramsMisato Nakabayashi, Taro Sekiyama, Ichiro Hasuo, Yutaka Ishikawa. 2454-2459 [doi]
- Privacy-Preserving HCV Data Outsourcing Scheme for Initial Diagnosis and Epidemiological StudyHui Li 0016, Kexin Liu. 2460-2465 [doi]